Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam Professional Cloud Architect All Questions

View all questions & answers for the Professional Cloud Architect exam

Exam Professional Cloud Architect topic 1 question 120 discussion

Actual exam question from Google's Professional Cloud Architect
Question #: 120
Topic #: 1
[All Professional Cloud Architect Questions]

Your company has a project in Google Cloud with three Virtual Private Clouds (VPCs). There is a Compute Engine instance on each VPC. Network subnets do not overlap and must remain separated. The network configuration is shown below.

Instance #1 is an exception and must communicate directly with both Instance #2 and Instance #3 via internal IPs. How should you accomplish this?

  • A. Create a cloud router to advertise subnet #2 and subnet #3 to subnet #1.
  • B. Add two additional NICs to Instance #1 with the following configuration: ג€¢ NIC1 ג—‹ VPC: VPC #2 ג—‹ SUBNETWORK: subnet #2 ג€¢ NIC2 ג—‹ VPC: VPC #3 ג—‹ SUBNETWORK: subnet #3 Update firewall rules to enable traffic between instances.
  • C. Create two VPN tunnels via CloudVPN: ג€¢ 1 between VPC #1 and VPC #2. ג€¢ 1 between VPC #2 and VPC #3. Update firewall rules to enable traffic between the instances.
  • D. Peer all three VPCs: ג€¢ Peer VPC #1 with VPC #2. ג€¢ Peer VPC #2 with VPC #3. Update firewall rules to enable traffic between the instances.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
XDevX
Highly Voted 3 years, 5 months ago
According to my understanding the requirement is that only VM1 shall be able to communicate with VM2 and VM3, but not VM2 with VM3. We can exclude d) as d) would enable VM2 to communicate with VM3 as well - my assumption is, that if the quizzer wanted that d) is the correct answer, he would make just 2 peerings - 1x between VM1 and VM2 and 1x between VM1 and VM3 repectively the VPCs. We can exclude c) as well - there is no connection between VPC1 and VPC3. IMHO a) will not work. So the only correct answer seems to be b) - what I don't understand is why we have to update the firewall rules as IMHO the default firewall rules enable such communication (maybe some restrictive rules are implemented - not enough details in the question to clarify that part). Please correct me if I am wrong.
upvoted 25 times
JeffClarke111
3 years, 4 months ago
Correct, maybe fw on the VM
upvoted 2 times
...
lazybeanbag
3 years, 4 months ago
I think it is because the instances are in separate VPCs. "Google Cloud Virtual Private Cloud (VPC) networks are by default isolated private networking domains. Networks have a global scope and contain regional subnets. VM instances within a VPC network can communicate among themselves using internal IP addresses as long as firewall rules permit. However, NO INTERNAL IP ADDRESS COMMUNICATION IS ALLOWED BETWEEN networks, unless you set up mechanisms such as VPC Network Peering or Cloud VPN." The instructions for setting up multiple interfaces tells you to check your firewall rules as as the firewall rules of the VPC apply to the network interface that it is attached to. https://cloud.google.com/vpc/docs/multiple-interfaces-concepts#firewall_rules_and_multiple_network_interfaces
upvoted 7 times
Ishu_awsguy
2 years, 3 months ago
The answer is "B". The following link has this - "Use multiple network interfaces when an individual instance needs access to more than one VPC network, but you don't want to connect both networks directly." https://cloud.google.com/vpc/docs/multiple-interfaces-concepts
upvoted 4 times
b6f53d8
1 year, 1 month ago
you can not add additional network interface to existing VM's
upvoted 1 times
...
...
...
Ishu_awsguy
2 years, 3 months ago
The answer is "B". The following link has this - "Use multiple network interfaces when an individual instance needs access to more than one VPC network, but you don't want to connect both networks directly." https://cloud.google.com/vpc/docs/multiple-interfaces-concepts
upvoted 13 times
Pankaj_007
2 years ago
B will not work. VM instances within a VPC network can communicate among themselves using internal IP addresses as long as firewall rules permit. However, no internal IP address communication is allowed between networks, unless you set up mechanisms such as VPC Network Peering or Cloud VPN.
upvoted 1 times
sameer2803
1 year, 11 months ago
this link says VM can have multiple NICs and attached to different VPCs. https://cloud.google.com/vpc/docs/create-use-multiple-interfaces so B is the answer
upvoted 6 times
...
...
...
...
MamthaSJ
Highly Voted 3 years, 4 months ago
Answer is B
upvoted 11 times
coutcin
2 years, 6 months ago
Instances are exist. You can not add or remove additional NICs to a VM
upvoted 6 times
...
...
awsgcparch
Most Recent 4 months ago
Selected Answer: B
Direct Connectivity: Adding multiple NICs to Instance #1 allows it to be part of multiple VPCs directly. This configuration enables direct communication with Instance #2 and Instance #3 via internal IPs without requiring additional routing configurations. Simplicity: This approach is straightforward and avoids the complexity of setting up VPC peering or VPN tunnels. It ensures that only Instance #1 has access to both VPC #2 and VPC #3, maintaining the separation of the other VPCs.
upvoted 2 times
...
afsarkhan
4 months, 2 weeks ago
Selected Answer: D
VPC peering will allow access to instance 2 & 3 from 1 with internal IP, with necessary firewall rules added.
upvoted 1 times
...
dija123
7 months, 1 week ago
Selected Answer: B
B for sure
upvoted 1 times
...
shashii82
8 months, 3 weeks ago
Option B allows you to add additional NICs to Instance #1, each connected to a different VPC, facilitating direct communication between Instance #1 and the other instances while maintaining separate subnets.
upvoted 1 times
...
kshlgpt
10 months, 4 weeks ago
B is wrong. NIC can only be configured while creating the instance. Here the instance is already created. C is correct answer. Refer limitation in this link: https://cloud.google.com/vpc/docs/create-use-multiple-interfaces
upvoted 2 times
...
AdityaGupta
1 year, 1 month ago
Selected Answer: B
Router, VPN and VPC Peering for all 3 network is not required. Only option B solves the given scenario.
upvoted 1 times
...
rusll
1 year, 3 months ago
All answers are incorrect: subnets do not overlap and must remain separated. => can't choose A or C or D. Which leaves us with A: you can't attach nics to a compute engine instance after creation : see: https://cloud.google.com/vpc/docs/create-use-multiple-interfaces
upvoted 3 times
...
natpilot
1 year, 7 months ago
Is D the correct, peering with adeguate forewall rule for only communication of Instance 1 with Instance 2 and 3
upvoted 1 times
...
mifrah
1 year, 8 months ago
I vote for B: VPC peering does not support "cascading". Peer VPC 1 with VPC 2, and VPC 2 with VPC 3 does not allow traffic from VPC 1 to VPC 3.
upvoted 1 times
...
razabpn
1 year, 9 months ago
Selected Answer: B
B: NIC usecase when an individual instance needs access to more than one VPC network, but you don't want to connect both networks directly https://cloud.google.com/vpc/docs/multiple-interfaces-concepts
upvoted 1 times
...
examch
1 year, 10 months ago
Selected Answer: B
B is the correct answer, Connect the VPC1 instance to VPC2 instance with NIC1 and Connect VPC1 instance to VPC3 instance with NIC2. And update firewall rules to enable traffic between them. https://cloud.google.com/vpc/docs/multiple-interfaces-concepts#firewall_rules_and_multiple_network_interfaces
upvoted 1 times
...
thamaster
1 year, 11 months ago
Selected Answer: B
best practice is to add NIC to first instance
upvoted 1 times
...
ANKITMANDLA
1 year, 11 months ago
Only solution is peering. N1 peering to n3 and n3 to n1 makes all network peered. So answer should be D
upvoted 1 times
...
Pankaj_007
2 years ago
B would be incorrect --> As without VPC peering or VPN it will not come into Play. D --> This is good as once VPN is established from 1 --> 2 and from 2 --> 3 ... data can flow from 1 to 3 via 2 ...
upvoted 1 times
Pankaj_007
2 years ago
I mean C should be correct ..
upvoted 1 times
...
...
megumin
2 years ago
Selected Answer: B
B is ok. C&D are wrong because they connect 1 to 2 and 2 to 3 , not 1 to3. 2 and 3 must be unreachable
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...